SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start


From course:

CISSP

» Start this Course
(Practice similar questions for free)
Question:

The Clark-Wilson Model.

Author: John Intindolo



Answer:

Which security model is used when an untrusted entity is being forced through an interface to access a trusted resource? - The Bell-LaPadula Model - The Biba Model - The Clark-Wilson Model - The Brewer-Nash Model


0 / 5  (0 ratings)

1 answer(s) in total